Identify and name the following tokens:
(i) public
(ii) ‘a’
(iii) ==
(iv) { }

1 Answer

Answer :

Ans. (i) public- Access Specifier
(ii) ‘a’- character
(iii) == is a Relational operator
(iv) { } is a Curly braces, Java uses them for surrounding the bodies of loops, methods and classes.

Related questions

Description : Identify the literals listed below: (i) 0.5 (ii)’A’ (iii) false (iv) “a”

Last Answer : Ans. (i) Floating point literal (ii) Character literal (iii) Boolean literal (iv) String literal

Description : Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes? (1) digital certificate (2) digital signature (3) passwords (4) tokens

Last Answer : passwords

Description : .Identify the physical and chemical changes from the following (i)Burning of magnesium in air (ii)Electrolysis of water (iii)Tarnishing of silver spoon (iv)Sublimation of iodine -Chemistry

Last Answer : (i) Burning of magnesium in air : Chemical change (ii) Tarnishing of silver spoon : Chemical change (iii) Sublimation of iodine : Physical change (iv) Electrolysis of water to form hydrogen and oxygen is also a chemical change.

Description : Identify the type of reaction(s) in the following equations. (i)CH4 + 2O2 CO2 + 2 H2O (ii) Pb(NO3)2 + 2KI ——–>Pbl2 + 2KNOs (iii) CaO + H2O ——–> Ca(OH)2 (iv) CuSO4 + Zn ——–> ZnSO4 + Cu -Chemistry

Last Answer : Answer. (i) Combustion reaction and oxidation reaction. (ii)Double displacement reaction and precipitation reaction. (iii) Combination reaction. (iv) Displacement reaction.

Description : For the complex [Fe(en)2Cl2], Cl, (en = ethylene diamine), identify (i) the oxidation number of iron, (ii) the hybrid orbitals and the shape of the complex, (iii) the magnetic behaviour of the complex, (iv) ... an optical isomer also, and (vi) name of the complex. (At. no. of Fe = 26) \ -Chemistry

Last Answer : i) [Fe(en)2Cl2] Cl or x + 0 + 2 (-1) + (-1) = 0 x + (- 3) = 0 or x = + 3 ∴ Oxidation number of iron, x = + 3 (ii) The complex has two bidentate ligands and two ... )2Cl2] Cl, only cis-isomer shows optical isomerism. (vi) Name of complex: Dichloridobis (ethane-1, 2- diamine) Iron (III) chloride

Description : Study the given figure below and answer the question that follow important-questions-for-class-12-biology-cbse-fertilisation-pregnancy-and-embryonic-development-t-33-3 (i)Name the stage of human embryo the ... implantation in the uterus. (iv)Where are the stem cells located in this embryo? -Biology

Last Answer : (i)The stage is blastocyst. (ii) A—Trophoblast. It helps in attachment to endometrium during implantation and provides nourishment to developing embryo. (iii) Inner cell mass acts as precursor to embryo ... into ectoderm and endoderm. (iv) Stem cells are located in inner cell mass of embryo.

Description : n the following human pedigree, the filled symbols represent the affected individuals. Identify the type of given pedigree. (i) (ii) (iii) (iv) (a) Autosomal recessive (b) X-linked dominant (c) Autosomal dominant (d) X-linked recessive

Last Answer : (a) Autosomal recessive

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Identify the components labelled A, B, C and D in the diagram below from the list (i) to (viii) given along with Components : (i) Cristae of mitochondria (ii) Inner membrane of mitochondria (iii) Cytoplasm (iv) Smooth endoplasmic ... viii) (vi) (c) (vi) (v) (iv) (vii) (d) (v) (i) (iii) (ii)

Last Answer : (a) (v) (iv) (viii) (iii)

Description : Match the columns and identify the correct option. Column I Column II A. Thylakoids (i) Disc-shaped sacs in Golgi apparatus B. Cristae (ii) Condensed structure of DNA C. Cisternae (iii) Flat membranous sacs in stroma D. Chromatin (iv) ... iii), C-(i), D-(ii) (d) A-(iii), B-(iv), C-(i), D-(ii)

Last Answer : (d) A-(iii), B-(iv), C-(i), D-(ii)

Description : The transverse section of a plant shows following anatomical features : (i) Large number of scattered vascular bundles surrounded by bundle sheath (ii) Large conspicuous parenchymatous ground ... (a) Monocotyledonous stem (b) Monocotyledonous root (c) Dicotyledonous stem (d) Dicotyledonous root

Last Answer : (a) Monocotyledonous stem

Description : Consider the following statements and identify the right ones. i. COR is relatively low in labour intensive sectors. ii. COR will be high in capital intensive sectors iii. Both iv. None

Last Answer : iii. Both

Description : Which of the following is the task of a Test Lead / Leader: i. Interaction with the Test Tool Vendor to identify best ways to leverage test tool on the project. ii. Write Test Summary Reports based on the ... is true and ii,iii,iv are false d) iii and iv is correct and i and ii are incorrect

Last Answer : a) i, ii, iii is true and iv is false

Description : Identify the sensors for the following : i) Wind speed ii) RPM of generator shaft iii) Temperature in generator iv) Cable untwisting v) Vibration vi) Wind direction

Last Answer : i) Wind Speed : Anemometer. ii) RPM of Generator Shaft: Accelerometers. iii) Temperature in Generator: Thermistor, thermocouple, RTD. iv) Cable Untwisting : Cable Twisting sensor. v) Vibration : Accelerometer, piezoelectric. vi) Wind direction: Wind vane.

Description : Identify direct addressing instructions from following instructions : (i) MOV RO, R5 (ii) MOV RO, 80 H (iii) MOV RO, #75H (iv) ADD A, 45 H

Last Answer : Instructions ii) and iv) are direct addressing as 80H and 45H are direct addresses

Description : Identify type of BJT configuration having following features : (i) BJT configuration having the least current gain. (ii) KIT configuration called as voltage follower. (iii) BJT ... configuration suitable for voltage amplification. (vi) BJT configuration having the least output impedance.  

Last Answer : (i) BJT configuration having the least current gain : Common Base Configuration  (ii) KIT configuration called as voltage follower: Common Collector Configuration  (iii) BJT ... Emitter Configuration  (vi) BJT configuration having the least output impedance: Common Collector Configuration

Description : Did you know Monopoly has changed some of its tokens?

Last Answer : Bank money with water marks. Slum lords. If someone owns all properties of a color, and passes go twice without buying any houses, anybody who lands there can sue the owner the amount of the rent. FREE ... which is Government Office. They collect rent, and every turn they get $200., and that is it.

Description : Drupal tokens tutorial/help?

Last Answer : Ack! Computer script! My eyes! Get it away from me! Hasn’t google been able to help you out?

Description : How many tokens can be cashed out if presearh ?

Last Answer : If you do not have 1000 tokens in the presearch, you can cash out.

Description : How many tokens do you give per search ?

Last Answer : Presearch gives .25 tokens per search.

Description : List the different types of C tokens?

Last Answer : 1. Constants 2. Identifiers 3. Keywords 4. Operators 5. Special symbols 6. Strings

Description : Which of the following are true with respect to Indian Railways? 1. It is the larqest public sector undertaking 2. Indian Railway network is the fourth largest in the world 3. Factories at Kapurthala and Perarnbur manufacture passenger ... III (b) I and II (c) II, III and IV (d) I, II, III and IV

Last Answer : Ans: (d)

Description : Which of the following is not a program linking directive i) EXTRN ii) SEGMENT iii) NAME iv) PUBLIC v) USING a) iv, v b) ii, iii c) i, iii d) ii, v

Last Answer : c) i, iii

Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : C) i-false, ii-true, iii-false, iv-false

Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In the NetBill's protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii)the vendor is guaranteed payment when information is delivered  (iii) the customer ... , ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv 

Last Answer : d. i, ii, iv

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : DES (i) is a symmetric key encryption method (ii)guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : Name the operators listed below i) < ii) ++ iii) && iv) ?:

Last Answer : Ans. i) Less than comparison operator ii) Increment operator iii) And logical operator iv) Ternary operator

Description : Classify the following as primitive or non-primitive data types: (i) char (ii) arrays (iii) int (iv) classes

Last Answer : Ans. (i) char – Primitive (ii) arrays – Non primitive (iii) int – Primitive (iv) Classes – Non primitive

Description : Arrange the following primitive data types in an ascending order of their size: (i) char (ii) byte (iii) double (iv) int

Last Answer : Ans. The sizes of the given data types are as follows char = 2 bytes byte = 1 byte double = 8 bytes int = 4 bytes Arranging them in ascending order gives byte < char < int < double

Description : Classify the following as primitive or non-primitive data types: (i) char (ii) arrays (iii) int (iv) classes

Last Answer : Ans. (i) char – Primitive (ii) arrays – Non primitive (iii) int – Primitive (iv) Classes – Non primitive

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : Which of the following represents the step of scientific methodI- Develop hypothesis based on evidenceII- Calculate hash value of evidenceIII- Test the hypothesis to look for additional evidence IV-make an imaging of the original evidence A. All above B. I and III C. II and IV D. II, III and IV

Last Answer : B. I and III

Description : Which of the following represents the step of scientific method? I- Develop hypothesis based on evidence II- Calculate hash value of evidence III- Test the hypothesis to look for additional evidence IV-make an imaging of the ... a. I and IV b. I and II c. II, III and IV d. All of above

Last Answer : b. I and II

Description : Arithmetic and Logic Unit I. Perform Arithmetic operations II. Store Data III. Perform comparisons IV. Communicate with input devices Which of the following is true ? (1) I only (2) III only (3) I and II (4) I and III

Last Answer : I and III

Description : State the functions of i. Repeater ii. Switch iii. Gateway iv. Bridges

Last Answer : i) Repeater: Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this signal at its output. It ensures that the signals are not distorted or weak before it ... and decides whether to forward or discard it. It sends packets between two networks of same type.

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : When a private company is converted into public company. In which form it should be A. Schedule III B. Schedule IV C. Schedule VI D. None of these

Last Answer : C. Schedule VI

Description : A metal X' acquires a green colour coating on its surface on exposure to air. (i) Identify the metal X' and name the process responsible for this change. (ii)Name and write chemical ... the green coating formed on the metal. (iii) List two important methods to prevent the process. -Chemistry

Last Answer : (i) Metal is copper. The process is corrosion. (ii)Basic copper carbonate [CuCO3.Cu(0H)2]. (iii) • It should be coated with tin • It should be mixed with other metals to form alloys.

Description : Identify the correct match from the column I,II and III `:-`

Last Answer : Identify the correct match from the column I,II and III `:-` A. `1-c-iv,2-a-iii,3-b-i,4-d-ii` B. `1-d-iv, ... -c-ii` D. `1-d-iv,2-a-iii,3-b-ii,4-c-i`

Description : Identify the correct match from the column I,II and III

Last Answer : Identify the correct match from the column I,II and III A. `A-d-I,B-a-iii,C-b-iv,D-c-ii` B. `A-d-ii,B-a-iii ... c-i` D. `A-b-I,B-a-ii,C-c-iii,D-d-iv`

Description : Identify the correct option in column I, II and III

Last Answer : Identify the correct option in column I, II and III A. 2-a-iii,1-c-iv,3-b-I,4-d-ii B. 1-c-iv,2-d-iii,3-b ... ,4-c-ii D. 2-d-iii,1-c-iv,3-a-ii,4-b-iv.

Description : Identify the pairs of enantiomers and diastereomers from the following compounds I, II, and III :

Last Answer : Identify the pairs of enantiomers and diastereomers from the following compounds I, II, and III :